메뉴 건너뛰기




Volumn 5134 LNCS, Issue , 2008, Pages 167-186

Chattering laptops

Author keywords

Anonymity; Mobile computing; Network location awareness; Privacy; Wireless networks

Indexed keywords

GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS; INTERNET PROTOCOLS; LAPTOP COMPUTERS; LAWS AND LEGISLATION; TECHNOLOGY; TELECOMMUNICATION;

EID: 50249166667     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-70630-4_11     Document Type: Conference Paper
Times cited : (4)

References (46)
  • 2
    • 0016518897 scopus 로고
    • Efficient string matching: An aid to bibliographic search
    • Aho, A.V., Corasick, M.J.: Efficient string matching: an aid to bibliographic search. Communications of the ACM 18(6), 333-340 (1975)
    • (1975) Communications of the ACM , vol.18 , Issue.6 , pp. 333-340
    • Aho, A.V.1    Corasick, M.J.2
  • 4
    • 84885208335 scopus 로고    scopus 로고
    • Scanning electronic documents for personally identifiable information
    • Alexandria, VA, USA, October, ACM Press, New York () 2006
    • Aura, T., Kuhn, T.A., Roe, M.: Scanning electronic documents for personally identifiable information. In: Proceedings of 5th ACM Workshop on Privacy in the Electronic Society (WPES 2006), Alexandria, VA, USA, October 2006. ACM Press, New York (2006)
    • (2006) Proceedings of 5th ACM Workshop on Privacy in the Electronic Society (WPES
    • Aura, T.1    Kuhn, T.A.2    Roe, M.3
  • 6
    • 2942524994 scopus 로고    scopus 로고
    • Location privacy in pervasive computing
    • Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing 2(1), 46-55 (2003)
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.1 , pp. 46-55
    • Beresford, A.R.1    Stajano, F.2
  • 8
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24(2), 84-88 (1981)
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.L.1
  • 9
    • 50249087017 scopus 로고    scopus 로고
    • Cheshire, S., Krochmal, M.: Multicast DNS. Internet-Draft draft-cheshire-dnsext-multicastdns-06, IETF, Expired (August 2006)
    • Cheshire, S., Krochmal, M.: Multicast DNS. Internet-Draft draft-cheshire-dnsext-multicastdns-06, IETF, Expired (August 2006)
  • 11
    • 33744479345 scopus 로고    scopus 로고
    • Freenet: A distributed anonymous information storage and retrieval system
    • Federrath, H, ed, Designing Privacy Enhancing Technologies, Springer, Heidelberg
    • Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A distributed anonymous information storage and retrieval system. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 46-66. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2009 , pp. 46-66
    • Clarke, I.1    Sandberg, O.2    Wiley, B.3    Hong, T.W.4
  • 12
    • 50249139703 scopus 로고    scopus 로고
    • Cranor, L.F.: Web Privacy with P3P. O'Reilly, Sebastopol (2002)
    • Cranor, L.F.: Web Privacy with P3P. O'Reilly, Sebastopol (2002)
  • 13
    • 50249189414 scopus 로고    scopus 로고
    • Cuellar, J.R., Morris Jr., J.B., Mulligan, D.K., Peterson, J., Polk, J.M.: Geopriv requirements. RFC 3693, IETF (February 2004)
    • Cuellar, J.R., Morris Jr., J.B., Mulligan, D.K., Peterson, J., Polk, J.M.: Geopriv requirements. RFC 3693, IETF (February 2004)
  • 14
    • 84957800033 scopus 로고    scopus 로고
    • Díaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, 2482. Springer, Heidelberg (2003)
    • Díaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482. Springer, Heidelberg (2003)
  • 16
    • 85018108881 scopus 로고    scopus 로고
    • Passive data link layer 802.11 wireless device driver fingerprinting
    • Vancouver, B.C, ed, Canada, July, USENIX Association
    • Franklin, J., McCoy, D., Tabriz, P., Neagoe, V., Randwyk, J.V., Sicker, D.: Passive data link layer 802.11 wireless device driver fingerprinting. In: Vancouver, B.C. (ed.) 15th Proceedings of USENIX Security Symposium, Canada, July 2006, pp. 167-178. USENIX Association (2006)
    • (2006) 15th Proceedings of USENIX Security Symposium , pp. 167-178
    • Franklin, J.1    McCoy, D.2    Tabriz, P.3    Neagoe, V.4    Randwyk, J.V.5    Sicker, D.6
  • 18
    • 0020299523 scopus 로고
    • Security policies and security models
    • Los Alamitos, CA, USA, April, IEEE Computer Society Press, Los Alamitos
    • Goguen, J.A., Meseguer, J.: Security policies and security models. In: Proceedings of IEEE Symposium on Research in Security and Privacy, Los Alamitos, CA, USA, April 1982, pp. 11-20. IEEE Computer Society Press, Los Alamitos (1982)
    • (1982) Proceedings of IEEE Symposium on Research in Security and Privacy , pp. 11-20
    • Goguen, J.A.1    Meseguer, J.2
  • 21
    • 38149070135 scopus 로고    scopus 로고
    • Guha, S., Francis, P.: Identity trail: Covert surveillance using DNS. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, 4776. Springer, Heidelberg (2007)
    • Guha, S., Francis, P.: Identity trail: Covert surveillance using DNS. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol. 4776. Springer, Heidelberg (2007)
  • 25
    • 27544460278 scopus 로고    scopus 로고
    • Remote physical device fingerprinting
    • Oakland, CA, USA, May, IEEE Computer Society Press, Los Alamitos
    • Kohno, T., Broido, A., Claffy, K.: Remote physical device fingerprinting. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2005. IEEE Computer Society Press, Los Alamitos (2005)
    • (2005) Proceedings of IEEE Symposium on Security and Privacy
    • Kohno, T.1    Broido, A.2    Claffy, K.3
  • 26
    • 33748990899 scopus 로고    scopus 로고
    • Peripheral privacy notifications for wireless networks
    • Alexandria, VA, USA, November, ACM Press, New York () 2005
    • Kowitz, B., Cranor, L.: Peripheral privacy notifications for wireless networks. In: Proceedings of Workshop on Privacy in Electronic Society (WPES 2005), Alexandria, VA, USA, November 2005, pp. 90-96. ACM Press, New York (2005)
    • (2005) Proceedings of Workshop on Privacy in Electronic Society (WPES , pp. 90-96
    • Kowitz, B.1    Cranor, L.2
  • 27
    • 50249160150 scopus 로고    scopus 로고
    • Instant messaging puts on a business suit
    • Lawton, G.: Instant messaging puts on a business suit. Computer 36(3), 14-16 (2003)
    • (2003) Computer , vol.36 , Issue.3 , pp. 14-16
    • Lawton, G.1
  • 29
    • 50249090565 scopus 로고    scopus 로고
    • Möller, U, Cottrell, L, Palfrader, P, Sassaman, L, Mixmaster Protocol -Version 2. Internet-Draft draft-moeller-v2-01, IETF, Expired July 2003
    • Möller, U., Cottrell, L., Palfrader, P., Sassaman, L.: Mixmaster Protocol -Version 2. Internet-Draft draft-moeller-v2-01, IETF, Expired (July 2003)
  • 30
    • 34547339276 scopus 로고    scopus 로고
    • Hot or not: Revealing hidden services by their clock skew
    • Alexandria, VA, USA, November, ACM Press, New York () 2006
    • Murdoch, S.J.: Hot or not: Revealing hidden services by their clock skew. In: Proceedings of ACM Conference on Computer and Communications Security (CCS 2006), Alexandria, VA, USA, November 2006, pp. 27-36. ACM Press, New York (2006)
    • (2006) Proceedings of ACM Conference on Computer and Communications Security (CCS , pp. 27-36
    • Murdoch, S.J.1
  • 35
    • 50249176037 scopus 로고    scopus 로고
    • Piper, D., Swander, B.:AGSS-APIauthentication method for IKE. Internet-Draft draft-ietf-ipsec-isakmp-gss-auth-07, IETF, Expired (July 2001)
    • Piper, D., Swander, B.:AGSS-APIauthentication method for IKE. Internet-Draft draft-ietf-ipsec-isakmp-gss-auth-07, IETF, Expired (July 2001)
  • 39
    • 84957802536 scopus 로고    scopus 로고
    • Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, 2482. Springer, Heidelberg (2003)
    • Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482. Springer, Heidelberg (2003)
  • 41
    • 0030676973 scopus 로고    scopus 로고
    • Anonymous connections and onion routing
    • Oakland, CA, USA, May, IEEE Computer Society Press, Los Alamitos
    • Syverson, P.F., Goldschlag, D.M., Reed, M.G.: Anonymous connections and onion routing. In: Proc. 1997 IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 1997, pp. 44-54. IEEE Computer Society Press, Los Alamitos (1997)
    • (1997) Proc. 1997 IEEE Symposium on Security and Privacy , pp. 44-54
    • Syverson, P.F.1    Goldschlag, D.M.2    Reed, M.G.3
  • 42
    • 0036811662 scopus 로고    scopus 로고
    • k-Anonymity: A model for protecting privacy. International Journal on Uncertainty
    • Sweeney, L.: k-Anonymity: a model for protecting privacy. International Journal on Uncertainty. Fuzziness and Knowledge-based Systems 10(5), 557-570 (2002)
    • (2002) Fuzziness and Knowledge-based Systems , vol.10 , Issue.5 , pp. 557-570
    • Sweeney, L.1
  • 45
    • 50249179253 scopus 로고    scopus 로고
    • DOG: Efficient information flow tracing and program monitoring with dynamic binary rewriting
    • Technical report, MIT
    • Zhao, Q., Cheng, W.W., Yu, B., Hiroshige, S.: DOG: Efficient information flow tracing and program monitoring with dynamic binary rewriting. Technical report, MIT (2005)
    • (2005)
    • Zhao, Q.1    Cheng, W.W.2    Yu, B.3    Hiroshige, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.